Abstract
With the increase of video applications, the security of video data becomes more and more important. In this paper, we propose a new video encryption scheme for H.264/AVC video coding standard. We define Unequal Secure Encryption (USE) as an approach that applies different cryptographic algorithms (with different security strength) to different partitions of video data. The USE scheme includes two parts: video data classification and unequal secure video data encryption. For data classification, we propose 3 data classification methods and define 5 security levels in our scheme. For encryption, we propose a new stream cipher algorithm FLEX and XOR method to reduce computational cost. In this way, our scheme can achieve both high security and low computational cost. The experimental results show that the computational cost of the USE scheme is very low. In security level 0, the computational cost is about 18% of naive encryption. The USE scheme is very suitable for high security and low cost video encryption systems.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ostermann, J., Bormans, J., List, P., Marpe, D., Narroschke, M., Pereira, F., Stockhammer, T., Wedi, T.: Video coding with H.264/AVC: tools, performance, and complexity. IEEE Circuits and Systems Magazine 4(1), 7–28 (2004)
Furht, B., Socek, D.: Multimedia Security: Encryption Techniques, IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL (2003)
Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: CIIT 2003. IASTED International Conference on Communications, Internet and Information Technology, Scottsdale, AZ, (November 17-19, 2003) pp. 17–19 (2003)
Lookabaugh, T., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security Analysis of Selectively Encrypted MPEG-2 Streams. In: Multimedia Systems and Applications VI Conference, Orlando, FL (September 7-11, 2003)
Qiao, L., Nahrstedt, K.: Comparison of MPEG Encryption Algorithms, International Journal on Computer and Graphics. Special Issue on Data Security in Image Communication and Network 22(3) (1998)
Furht, B., Socek, D., Eskicioglu, A.M.: Fundamentals of multimedia encryption techniques. In: Multimedia Security Handbook, ch. 3, pp. 93–131. CRC Press, Boca Raton (2004)
Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmission. In: Proceedings of the Symposium on Network and Distributed Systems Security, IEEE, Los Alamitos (1996)
Qiao, L., Nahrstedt, K., Tam, I.: Is MPEG Encryption by Using Random List Instead of Zigzag Order Secure? In: IEEE International Symposium on Consumer Electronics, Singapore (December 1997)
Bhargava, B., Shi, C., Wang, Y.: MEPG: Video Encryption Algorithms (August 2002), available at http://raidlab.cs.purdue.edu/papers/mm.ps
Seidel, T., Socek, D., Sramka, M.: Cryptanalysis of Video Encryption Algorithms. In: TATRACRYPT 2003. Proceedings of The 3rd Central European Conference on Cryptology, Bratislava, Slovak Republic (2003)
Alattar, A., Al-Regib, G.: Evaluation of selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 4, pp IV-340-IV-343, (1999)
Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: CISST 1997. Proceedings of the 1st International Conference on Imaging Science, Systems and Technology, Las Vegas, NV, pp. 21–29 (July 1997)
National Institute of Standards and Technology (U.S.). Advanced Encryption Standards (AES). FIPS Publication 197 (2001)
Biryukov, A.: A New 128-bit Stream Cipher LEX, ECRYPT Stream Cipher Project Report, 2005, Available at http://www.ecrypt.eu.org/stream/lex.html
Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1Video, Project Description of SECMPEG, Technical University of Berlin, Germany (May 1995)
Maples, T.B., Spanos, G.A.: Performance study of selective encryption scheme for the security f networked real-time video. In: Proceedings of the 4th International Conference on Computer and Communications, Las Vegas, NV (1995)
Spanos, G.A., Maples, T.B.: Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications. In: Conference on Computers and Communications, pp. 72–78 (1996)
Shi, C., Bhargava, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the 6th International Multimedia Conference, Bristol, UK (September 12-16, 1998)
Shi, C., Wang, S.-Y., Bhargava, B.: MPEG Video Encryption in Real-Time Using Secret key Cryptography. In: PDPTA 1999. 1999 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV (June 28 - July 1, 1999)
Alattar, A.M., Al-Regib, G.I., Al-Semari, S.A.: Improved Selective Encryption techniques for Secure Transmission of MPEG Video Bit-Streams. In: ICIP 1999. Proceedings of the 1999 International Conference on Image Processing, Kobe, Japan (October 24-28, 1999) vol. 4, pp. 256–260 (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fan, Y., Wang, J., Ikenaga, T., Tsunoo, Y., Goto, S. (2007). A New Video Encryption Scheme for H.264/AVC. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-77255-2_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77254-5
Online ISBN: 978-3-540-77255-2
eBook Packages: Computer ScienceComputer Science (R0)